期刊文献+

基于FBDH算法的容错可验证公钥可搜索加密方案 被引量:3

Fault-tolerant and Verifiable Public Key Searchable Encryption Scheme Based on FBDH Algorithm
下载PDF
导出
摘要 在云存储服务中,为了实现对用户检索数据的隐私保护,研究者们提出了可搜索加密方案,公钥可搜索加密方案是其中的一种有效密文检索方案。文章提出一个基于FBDH算法及ElGamal加密签名算法的公钥可搜索加密方案。首先,使用FBDH算法对数据明文加密,使得数据密文解密过程具有容错性且计算效率高。其次,通过ElGamal加密签名算法分别对数据拥有者身份加密及对关键词签名,使得云服务器成功验证关键词合法性后返回的密文可以被数据使用者验证其合法性。文章给出了方案满足计算正确性的证明,并利用挑战应答游戏证明了方案能够抵御离线关键词猜测攻击。 In the cloud storage service,in order to protect the privacy of user’s retrieved data,researchers propose searchable encryption schemes,among which the public key searchable encryption scheme is an effective ciphertext retrieval scheme.This paper proposes a public key searchable encryption scheme based on FBDH algorithm and ElGamal encryption and signature algorithm.Firstly,FBDH algorithm is used to encrypt data plaintext,which makes the decryption process of data ciphertext fault-tolerant and efficient.Secondly,ElGamal encryption and signature algorithm is used to encrypt the identity of the data owner and the keywords signature,so that the ciphertext returned after the cloud server successfully verifies the validity of the keywords can be verified by the data user.This paper gives the proof that the scheme satisfies the accuracy of calculation,and proves that the scheme can resist the guessing attack of off-line keywords by using the challenge response game.
作者 周权 杨宁滨 许舒美 ZHOU Quan;YANG Ningbin;XU Shumei(School of Mathematics and Information Science,Guangzhou University,Guangzhou 510006,China)
出处 《信息网络安全》 CSCD 北大核心 2020年第3期29-35,共7页 Netinfo Security
基金 国家重点研发计划[2018YFB0803600] 广东省重点领域研发计划[2019B020215004]。
关键词 ELGAMAL FBDH算法 可搜索加密 可验证性 容错性 ElGamal FBDH algorithm searchable encryption verifiability fault-tolerance
  • 相关文献

参考文献2

二级参考文献60

  • 1Wang Cong,Chow S S M,Wang Qian,et al.Privacy Preserving Public Auditing for Secure Cloud Storage[J].IEEE Transactions on Computers,2013,62(2):362-375.
  • 2Song X D,Wagner D,Perrig A.Practical Techniques for Searches on Encrypted Data [C]// Proceedings of 2000 IEEE Symposium on Security and Privacy.[S.l.]:IEEE Press,2000:44-55.
  • 3Baek J,Safiavi-Naini R,Susilo W.Public Key Encryption with Keyword Search Revisited [C]// Proceedings of International Conference on Computational Science and Its Applications.Perugia,Italy: Springer-Verlag,2008:1249-1259.
  • 4方黎明.带关键字搜索公钥加密的研究[D].南京:南京航空航天大学,2012.
  • 5Chai Qi,Gong Guang.Verifiable Symmetric Searchable Enryption for Semi-honest But-curious Servers [EB/ OL].[2013-12-25].http:// www.cacr.math.Uwater-loo.ca/ techreports/2011/ cacr201122.
  • 6Li Jin,Wang Qian,Wang Cong,et al.Fuzzy Keyword Search over Encrypted Data in Cloud Computing[C]//Proceedings of IEEE INFOCOM ’10.[S.l.]: IEEE Press,2010:1-5.
  • 7Rhee H S,Park J H,Susilo W,et al.Improved Searchable Public Key Encryption with Designated Tester [C]// Proceedings of the 4th International Symposium on Information,Computer,and Communications Security.Sydney,Australia:ACM Press,2009:376-379.
  • 8Zhao Yuanjie,Chen Xiaofeng,Ma Hua,et al.A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search[J].Journal of Wireless Mobile Networks,Ubiquitous Computing,and Dependable Applications,2012,3(1/2):72-81.
  • 9Yang Haomiao,Xu Chunxiang,Zhao Hongtian.An Efficient Public Key Encryption with Keyword Scheme Not Using Pairing[C]// Proceedings of the 1st International Conference on Instrumentation,Measurement,Computer,Communication and Control.Beijing,China:[s.n.],2011:900-904.
  • 10Luo W,Tan J.Public Key Encryption with Keyword Search Based on Factoring [C]// Proceedings of CCIS ’12.[S.l.]:IEEE Press,2012:1245-1247.

共引文献82

同被引文献25

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部